Skip to content

Instantly share code, notes, and snippets.

@m3lixir
Last active October 18, 2024 04:04
Show Gist options
  • Save m3lixir/da014a82b8da7e5f112d90c54157f496 to your computer and use it in GitHub Desktop.
Save m3lixir/da014a82b8da7e5f112d90c54157f496 to your computer and use it in GitHub Desktop.
test description
{
"meta": {
"theme": "flat"
},
"basics": {
"name": "Melisa K. Savich",
"label": "Security Research Engineer",
"email": "[email protected]",
"phone": "+12489432251",
"website": "https://melisasavich.com",
"summary": "I am a cybersecurity professional with over 7 years of experience in research, development, and national security projects. I specialize in threat detection, vulnerability assessment, and system security, having contributed to cutting-edge solutions at Sandia National Laboratories while supporting academic initiatives. My expertise spans technical roles and collaborative efforts, driving innovations in secure systems and cybersecurity defense.",
"location": {
"address": "",
"postalCode": "MI 48152",
"city": "Livonia",
"countryCode": "US",
"region": "Michigan"
},
"profiles": [
{
"network": "LinkedIn",
"username": "melisasavich",
"url": "https://www.linkedin.com/in/melisasavich"
},
{
"network": "GitHub",
"username": "m3lixir",
"url": "https://github.com/m3lixir"
},
{
"network": "Google Scholar",
"username": "deS7-_gAAAAJ",
"url": "https://scholar.google.com/citations?user=deS7-_gAAAAJ"
}
]
},
"projects": [
{
"name": "Technical Solutions & Digital Experience Architect",
"description": "Revitalized digital operations for 48 Flavors, a local ice cream shop, enhancing e-commerce functionality, boosting online orders, and increasing brand visibility.",
"highlights": [
"Boosted food delivery platform orders by 55% within 1 year by revamping menus, creating AI-assisted item descriptions, and designing e-commerce visuals, leading to a more user-friendly and visually appealing online ordering experience.",
"Optimized online visibility and operations by creating 2 websites using Google Sites and Square, managing Google Business Profile, and integrating 6 Google products for 48 Flavors' online debut.",
"Improved online cake ordering system by configuring a 24-hour preparation time, resulting in over 100 online cake orders over a 1-year period post-separation from the Baskin-Robbins franchise, driving revenue growth."
],
"keywords": [
"Google Business Profile",
"Google Cloud",
"Google Sites",
"BentoBox",
"Clover",
"Square",
"DoorDash",
"UberEats",
"Grubhub"
],
"startDate": "2023-11-01",
"url": "https://www.48flavorsicecream.com",
"roles": [
"<FIXME ROLE>"
],
"entity": "48 Flavors Ice Cream",
"type": "<FIXME TYPE>"
}
],
"work": [
{
"description": "Federally Funded Research and Development Center (FFRDC)",
"startDate": "2020-06",
"endDate": "2023-10",
"position": "R&D S&E, Cybersecurity",
"name": "Sandia National Laboratories",
"url": "https://www.sandia.gov",
"location": "Livermore, CA",
"summary": "Led innovative research and development in cybersecurity, focusing on threat detection, vulnerability assessments, and system security for critical infrastructure. Collaborated with multidisciplinary teams to deliver advanced solutions aligned with national security objectives.",
"highlights": [
"Developed an ensemble fuzzing system that integrated 5-10 fuzzers, significantly improving threat detection and response.",
"Achieved 70-90% coverage on critical binary targets using AFL++ variants, meeting stringent security requirements.",
"Reduced debug time by 30% by enforcing development standards and leading backlog refinement efforts."
]
},
{
"description": "Federally Funded Research and Development Center (FFRDC)",
"startDate": "2018-06",
"endDate": "2020-05",
"position": "Critical Skills Recruiting Program Fellow",
"name": "Sandia National Laboratories",
"url": "https://www.sandia.gov",
"location": "Albuquerque, NM",
"summary": "Advanced critical technology initiatives while pursuing a fully funded Master's degree, contributing to Sandia's national security goals. Developed innovative solutions alongside technical teams to address pressing cybersecurity challenges.",
"highlights": [
"Created a robust framework in the ICS/SCADA modeling platform to facilitate Data Acquisition (DAQ) with Hardware-in-the-Loop (HITL), strengthening infrastructure security applications.",
"Conducted research in cyber modeling and simulation, focusing on high-consequence networks, high-value networks, embedded systems, and control systems."
]
},
{
"description": "Federally Funded Research and Development Center (FFRDC)",
"startDate": "2017-05",
"endDate": "2018-05",
"position": "Center for Cyber Defenders Intern",
"name": "Sandia National Laboratories",
"url": "https://www.sandia.gov",
"location": "Albuquerque, NM",
"summary": "Supported national cybersecurity efforts, specializing in vulnerability assessments, malware analysis, and intrusion detection. Applied computer science expertise to solve complex software and hardware security challenges.",
"highlights": [
"Improved automated ELK dashboard deployment and monitoring within an ICS/SCADA platform, enhancing the analysis of cyber/physical impacts on critical infrastructure systems.",
"Implemented honeypots within an experimental cyber range designed to simulate and analyze sophisticated cyber threats."
]
},
{
"startDate": "2017-09",
"endDate": "2018-04",
"position": "Instructional Aide for Introduction to Computer Security",
"name": "University of Michigan College of Engineering",
"description": "EECS 388: Introduction to Computer Security",
"url": "https://eecs388.org",
"location": "Ann Arbor, MI",
"summary": "Assisted in teaching computer security principles, providing support on coursework related to network vulnerabilities and secure system design. Guided students through practical exercises to deepen their understanding of cybersecurity threats.",
"highlights": [
"Enhanced Cybersecurity course content and projects, ensuring alignment with educational objectives, resulting in an increase in student engagement and course satisfaction.",
"Oversaw the smooth administration of exams for 300+ students, managing writing, testing, grading, and testing locations, ensuring efficient processes and positive student experiences.",
"Supported student success by delivering effective answers to 10+ curriculum-related questions on Piazza daily, contributing to a dynamic learning atmosphere in computer science courses."
]
},
{
"startDate": "2016-09",
"endDate": "2017-05",
"position": "Instructional Aide for Programming and Introductory Data Structures",
"name": "University of Michigan College of Engineering",
"description": "EECS 280: Programming and Introductory Data Structures",
"url": "https://eecs280.org",
"location": "Ann Arbor, MI",
"summary": "Led students through foundational programming and data structure concepts, offering individual support and troubleshooting. Simplified complex topics in lectures and helped students develop their coding skills.",
"highlights": [
"Managed exam logistics for 1000+ students, ensuring smooth processes and upholding academic integrity.",
"Expanded Stanford's MOSS with custom scripts, identifying 5-7% of projects as potential academic misconduct violations.",
"Led weekly sessions for 25 students, improving understanding of introductory programming concepts."
]
},
{
"startDate": "2016-05",
"endDate": "2016-08",
"position": "Grader for Programming and Introductory Data Structures",
"name": "University of Michigan College of Engineering",
"description": "EECS 280: Programming and Introductory Data Structures",
"url": "https://eecs280.org",
"location": "Ann Arbor, MI",
"summary": "Reviewed and graded coursework for introductory programming and data structures, ensuring adherence to technical standards. Provided detailed feedback to students to improve code efficiency and problem-solving techniques.",
"highlights": [
"Graded weekly lab assignments for accuracy and course adherence.",
"Provided feedback on coding style, encouraging best practices."
]
},
{
"description": "<FIXME DESCRIPTION>",
"startDate": "2016-01",
"endDate": "2016-12",
"position": "Undergraduate Research Assistant",
"name": "University of Michigan College of Literature, Science, and the Arts",
"url": "https://lsa.umich.edu",
"location": "Ann Arbor, MI",
"summary": "Contributed to research focused on data-driven solutions, conducting experiments and analyzing results to support ongoing academic projects. Developed algorithms and models to solve interdisciplinary research problems.",
"highlights": [
"Conducted literature reviews, recommending relevant academic papers to support research.",
"Authored summaries and analyses to enhance understanding of research findings."
]
},
{
"startDate": "2015-09",
"endDate": "2016-09",
"position": "Computer Operator",
"name": "University of Michigan Medical School",
"description": "Medical School Information Services - Help Me Now",
"url": "https://www.michiganmedicine.org",
"location": "Ann Arbor, MI",
"summary": "Provided technical support for faculty, staff, and students, resolving issues with computers and AV equipment. Managed help desk operations, handled equipment setups, and maintained the ticketing system for efficient troubleshooting.",
"highlights": []
}
],
"education": [
{
"institution": "New York University",
"area": "Computer Science",
"studyType": "Master of Science",
"startDate": "2018-09-01",
"endDate": "2020-05-20",
"score": "3.9/4.0",
"courses": [
"Design and Analysis of Algorithms I",
"Software Engineering I",
"Information Visualization",
"Penetration Testing and Vulnerability Analysis",
"Artificial Intelligence I",
"Computer Networking",
"Introduction to Offensive Security",
"Distributed Systems"
]
},
{
"institution": "University of Michigan",
"area": "Computer Science",
"studyType": "Bachelor of Science",
"startDate": "2015-01-01",
"endDate": "2018-04-26",
"score": "3.4/4.0",
"courses": [
"Elementary Programming Concepts",
"Discrete Math",
"Programming and Introductory Data Structures",
"Data Structures and Algorithms",
"Introduction to Computer Organization",
"Foundations of Computer Science",
"Introduction to Computer Security",
"Computing for Computer Scientists",
"Mobile App Development for Entrepreneurs",
"Introduction to Cryptography",
"Introduction to Operating Systems",
"Database Management Systems"
]
}
],
"publications": [
{
"name": "Taint-Driven Firmware Fuzzing of Embedded Systems",
"publisher": "New York University",
"releaseDate": "2020-05-15",
"url": "https://melisasavich.com/assets/pdf/taint-driven-firmware-fuzzing-embedded-systems-thesis.pdf",
"summary": ""
},
{
"name": "CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts",
"publisher": "IEEE Vehicular Networking Conference (VNC)",
"releaseDate": "2018-12-05",
"url": "https://melisasavich.com/assets/pdf/commpact-evaluating-autonomous-vehicle-contracts.pdf",
"summary": ""
},
{
"name": "Taint-Driven Embedded Software Fuzzing",
"publisher": "RSA Conference",
"releaseDate": "2019-03-06",
"url": "https://melisasavich.com/assets/pdf/taint-driven-embedded-software-fuzzing-poster.pdf",
"summary": "RSAC Security Scholar Poster Board Exhibition"
},
{
"name": "Artificial Network Traffic Generation",
"publisher": "Office of Scientific and Technical Information (OSTI)",
"releaseDate": "2017-07-26",
"url": "https://melisasavich.com/assets/pdf/artificial-network-traffic-generation-poster.pdf",
"summary": ""
}
],
"awards": [
{
"title": "Black Hat USA 2019 Student Scholarship",
"date": "2019-08-07",
"awarder": "Black Hat",
"summary": "The Black Hat USA Student Scholarship program offers top cybersecurity students the chance to attend the world's leading information security event. Nominated by industry expert Rebecca Lynch, I was provided with a complimentary pass to the Black Hat USA 2019 conference, where I participated in exclusive briefings, hands-on training, and technical sessions. This prestigious scholarship facilitated opportunities to engage with the latest cybersecurity research, network with industry leaders, and gain valuable insights into emerging trends and technologies."
},
{
"title": "RSAC 2019 Security Scholar",
"date": "2019-03-04",
"awarder": "RSA Conference",
"summary": "The RSA Conference Security Scholar program recognizes top cybersecurity students and provides them with opportunities to engage with leading experts and industry professionals at the RSA Conference. Scholars participate in exclusive events, such as expert dinners and roundtable discussions, and receive complimentary conference passes and travel accommodations. This prestigious program aims to enrich students' knowledge and professional networks while fostering discussions on critical cybersecurity topics."
}
],
"languages": [
{
"language": "English",
"fluency": "Master"
},
{
"language": "Macedonian",
"fluency": "Master"
},
{
"language": "French",
"fluency": "Intermediate"
}
],
"skills": [
{
"name": "Core Competencies",
"level": "Master",
"keywords": [
"Analytical Reasoning",
"Creativity",
"Solution-Oriented Thinking",
"Stakeholder Engagement",
"Team Collaboration",
"Technical Writing"
]
},
{
"name": "Cybersecurity Expertise",
"level": "Advanced",
"keywords": [
"Incident Response",
"Penetration Testing",
"Application Security",
"Cyber Threat Intelligence",
"Malware Analysis",
"Network Security"
]
},
{
"name": "Vulnerability & Risk Management",
"level": "Advanced",
"keywords": [
"Vulnerability Research (osv.dev, NVD/CVE)",
"Threat Modeling",
"Risk Mitigation",
"Exploit Development",
"Secure Coding Practices"
]
},
{
"name": "Programming & Scripting",
"level": "Intermediate",
"keywords": [
"Python",
"Bash",
"C/C++",
"Fuzzing",
"Binary Analysis",
"Reverse Engineering",
"Taint Analysis"
]
},
{
"name": "DevOps & Integration",
"level": "Intermediate",
"keywords": [
"DevSecOps",
"GitHub Actions",
"CI/CD, Docker",
"Kubernetes",
"Jenkins",
"Terraform",
"AWS",
"Cloud Security"
]
},
{
"name": "Tools & Frameworks",
"level": "Advanced",
"keywords": [
"Wireshark",
"Burp Suite",
"Metasploit",
"Nessus",
"Splunk",
"ELK Stack (Elasticsearch, Logstash, Kibana)",
"SIEM solutions"
]
},
{
"name": "Automation & Testing",
"level": "Advanced",
"keywords": [
"Automated Defenses",
"Continuous Security Testing",
"Vulnerability Scanning",
"Infrastructure as Code (IaC)",
"Ansible"
]
},
{
"name": "Entrepreneurship",
"level": "Intermediate",
"keywords": [
"Business Development",
"Product Innovation",
"Industrial Research"
]
}
],
"interests": [
{
"name": "Security Operations & Threat Intelligence",
"keywords": [
"Emerging trends in Incident Response",
"Automation in Cybersecurity",
"Advancements in Malware Defense"
]
},
{
"name": "Vulnerability & Risk Management",
"keywords": [
"Exploring cutting-edge methods in Vulnerability Research",
"Threat Hunting",
"Open-Source Security Solutions"
]
},
{
"name": "Programming & Analysis",
"keywords": [
"Passion for improving Python skills",
"Learning advanced techniques in Fuzzing and Binary Analysis"
]
},
{
"name": "DevOps & Integration",
"keywords": [
"Continuous learning in DevSecOps practices",
"Container security",
"CI/CD pipeline automation"
]
}
]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment